IDSC Final Quizzes 7, 8, 9, 10, 11, 12, 13

Ace your homework & exams now with Quizwiz!

put(s) users in control so that they can create custom reports on an as-needed basis by selecting fields, ranges, summary conditions, and other parameters

Ad hoc reporting tools

a class of computer software that seeks to reproduce or mimic human thought, decision-making, or brain functions

Artificial Intelligence

Which transaction rule is known as the 'All or nothing rule'?

Atomicity

an open source, decentralized payment system that operates in a peer-to-peer environment, without bank or central authority

Bitcoin

Which of the following stakeholders were NOT vitally affected in the Blockbuster case? All stakeholders were somewhat affected. Select the least affected one. Blockbuster's suppliers Blockbuster's video rental customers Blockbuster's stockholders Blockbuster's potential new customers

Blockbuster's suppliers

the process of combining aspects of reporting, data exploration and ad hoc queries, and sophisticated data modeling and analysis.

Business Intelligence

A research scientist with a major pharmaceutical firm in New Jersey is caught passing on sensitive information, worth millions of dollars, regarding the composition and test results of his firm's latest drug to a rival company. What crime is he being held responsible for?

Corporate Espionage

Which of the following is NOT a type of problem that would be best suited for AI to solve? Would would AI be best suited to solve?

Creative tasks. Best suited for: Data intensive, superhuman, or repetitive tasks

databases focused on addressing the concerns of a specific problem or business unit

Data marts

Which of the following is FALSE about the stockholder theory?

Executives should balance the interests of stockholders with those of other stakeholders

Stockholder theory true statements

Executives should increase corporate profitability through legal, non-deceptive means Executives should see stakeholders as means to increase corporate profits Executives should maximize long-term corporate profits

According to the stakeholder theory, executives should do the following

Give equal consideration to the legitimate interests of all stakeholders Respect the rights of all stakeholders Adopt corporate policies that produce the optimal balance among stakeholders' interests

If a computer system can be equated to a layered cake, which of the following combinations represents the computer system in the bottom-to-top order?

Hardware, operating system, application, user

Which of the following is NOT a concern with blockchain technology's future?

Higher transaction costs due to the computing power needed for mining

Which of the following is an example of application software? Mac OS, MS Windows, MS Word, Linux

MS Word (software that performs specific tasks for an end-user)

define artificial intelligence

Machines that respond to stimulation consistent with traditional responses from humans, given the human capacity for contemplation, judgment, and intention

the Isolation principle

Multiple transactions occur independently without interference

What type of relationship is it when, for any one entity, there are many examples of another entity?

One-to-many relationship

Difference between operating systems and application software?

Operating systems control the hardware, while application software performs the work that users and firms are directly interested in accomplishing.

Smith and Forest (2004) proposed six action areas which require attention in managing customer data. Among these action areas, secondary use of data is a concern because

Organizations have an external policy for secondary data sharing but do not follow it Organizations are often times too liberal about who is considered an affiliate and therefore give many outsiders access to customer data Many organizations have no policy on secondary internal uses of data

According to the stakeholder theory, executives should do the following EXCEPT?

Place customers' and employees' interests ahead of stockholders' interests

A variant of utility computing where vendors provide the operating system and supporting software like database management systems but where client firms write their own code?

Platform as a service

Consumer advocates objected to the merging of online data from DoubleClick and offline data from Abacus because of their concern over:

Profiling using personal data

According to the IoT article, what is the biggest challenge with IoT devices?

Protecting IoT from cyberattacks

Why do firms need to create separate data repositories for their reporting and analytics work?

Running analytics against transactional data can bog down a Transaction Processing System.

Relational database management systems (RDMS) typically provide a series of tools. Which of the following is not among the set of tools provided by RDMS? What are the correct ones?

Tools for identifying foreign keys. Correct: Tools for producing printed reports, conducting searches, and creating tables

The protocol that works its magic at the start and endpoint of Internet communication to ensure a perfect copy of a message is sent?

Transmission Control Protocol

a firm that provides hardware and services to run websites of others

Web hosting service

Peering

a situation when separate ISPs connect their networking equipment together to share traffic

protesters who seek to make a political point by leveraging technology tools, often through system infiltration, defacement, or damage

activists

technologies that measure and analyze human body characteristics for identification or authentication purposes

biometrics

the hordes of surreptitiously infiltrated computers, linked and controlled remotely, also known as zombie networks

botnets

One of the risks associated with SaaS is the

dependence on a single vendor

Internet backbone

high-speed data lines provided by many firms all across the world that interconnect and collectively form the core of the Internet

the process of breaking data in a table down into a series of tables

normalization

the practice of tricking employees into revealing information or performing tasks that may compromise a firm's security

social engineering

The address one types into a Web browser

uniform resource locator


Related study sets

Google Analytics Certification - Assessment 1

View Set

Ch 3 Pharmacology of the Autonomic Nervous system

View Set

Base quantities and derived quantities

View Set

Questions and answers my French class

View Set

APAH Chapter 22 // Beauty, Science, and Spirit in Italian Art

View Set